Escaping an Abusive Household
๐ขmathematics
Flag this post
Obsidian for studying
๐ขmathematics
Flag this post
Keynote: Supply Chain Reaction: A Cautionary Tale in K8s Security - S. Potter & A.G. Veytia
youtube.comยท9h
๐open source
Flag this post
From Paper to Pocket: How Wallet-Native CX is Rewriting the Insurance Playbook -
enterprisetimes.co.ukยท11h
๐open source
Flag this post
Cyberattackers are getting more evasive: How can defenders keep up?
siliconrepublic.comยท2d
๐open source
Flag this post
AI's Impact on Social Psychology: Ethical Guardrails Matter
psychologytoday.comยท1d
๐ขmathematics
Flag this post
Show HN: General Intelligence โ Active knowledge framework for machine learning
๐open source
Flag this post
๐ฅ Tech Talks Weekly #82
techtalksweekly.ioยท4h
๐open source
Flag this post
The Future of AI-Powered Security
๐open source
Flag this post
Any-Depth Alignment: Unlocking Innate Safety Alignment of LLMs to Any-Depth
๐open source
Flag this post
InteractiveAdvertisingBureau/openrtb2.x
github.comยท20h
๐open source
Flag this post
Automated Anomaly Detection in Blockchain Transactions via Adversarial Graph Neural Networks (AGNN)
๐ขmathematics
Flag this post
Harnessing nonlinearity to tame wave dynamics in nonreciprocal active systems
link.aps.orgยท6h
๐ขmathematics
Flag this post
Google sues cybercriminals behind E-ZPass, USPS text scams
thehill.comยท4h
๐open source
Flag this post
How Cellebrite Is Unlocking The Power Of AI For Digital Investigations
forensicfocus.comยท1d
๐open source
Flag this post
Loading...Loading more...